Which method is used by AMP against zero-day and targeted file-based attacks?

Which method is used by AMP against zero-day and targeted file-based attacks?
A . analyzing behavior of all files that are not yet known to the reputation service
B . periodically evaluating emerging threats as new information becomes available
C . implementing security group tags
D . obtaining the reputation of known files

Answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware­protection/solution-overview-c22-734228.html

Latest 300-725 Dumps Valid Version with 60 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments